Ali et al., 2018 - Google Patents
Gaze stability for liveness detectionAli et al., 2018
View HTML- Document ID
- 2813883322786584115
- Author
- Ali A
- Hoque S
- Deravi F
- Publication year
- Publication venue
- Pattern Analysis and Applications
External Links
Snippet
Spoofing attacks on biometric systems are one of the major impediments to their use for secure unattended applications. This paper explores features for face liveness detection based on tracking the gaze of the user. In the proposed approach, a visual stimulus is …
- 238000001514 detection method 0 title abstract description 61
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00268—Feature extraction; Face representation
- G06K9/00281—Local features and components; Facial parts ; Occluding parts, e.g. glasses; Geometrical relationships
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00013—Image acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00228—Detection; Localisation; Normalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00597—Acquiring or recognising eyes, e.g. iris verification
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Czajka et al. | Presentation attack detection for iris recognition: An assessment of the state-of-the-art | |
| Ross et al. | Some research problems in biometrics: The future beckons | |
| Ramachandra et al. | Presentation attack detection methods for face recognition systems: A comprehensive survey | |
| Chingovska et al. | Face recognition systems under spoofing attacks | |
| Chen et al. | Spoofing faces using makeup: An investigative study | |
| Li et al. | Seeing your face is not enough: An inertial sensor-based liveness detection for face authentication | |
| Ali et al. | Gaze stability for liveness detection | |
| US20190392145A1 (en) | Detection of print-based spoofing attacks | |
| CN108369785A (en) | Activity determination | |
| Rigas et al. | Biometric recognition via probabilistic spatial projection of eye movement trajectories in dynamic visual environments | |
| Ali et al. | Liveness detection using gaze collinearity | |
| CN106203369A (en) | Active stochastic and dynamic for anti-counterfeiting recognition of face instructs generation system | |
| Li et al. | Empirical study of face authentication systems under OSNFD attacks | |
| Ali et al. | Directional sensitivity of gaze-collinearity features in liveness detection | |
| Chou | Presentation attack detection based on score level fusion and challenge-response technique. | |
| Mittal et al. | GOTCHA: Real-time video deepfake detection via challenge-response | |
| Ali et al. | Spoofing attempt detection using gaze colocation | |
| Qin et al. | Vulnerabilities of unattended face verification systems to facial components-based presentation attacks: An empirical study | |
| Bagga et al. | Spoofing detection in face recognition: A review | |
| Alsufyani et al. | Biometric presentation attack detection using gaze alignment | |
| Kisku et al. | Face spoofing and counter-spoofing: a survey of state-of-the-art algorithms | |
| CN111723636A (en) | Fraud detection using optokinetic responses | |
| Ma et al. | Multi-perspective dynamic features for cross-database face presentation attack detection | |
| Agarwal et al. | Biometrics in extended reality: a review | |
| Xin et al. | A survey of liveness detection methods for face biometric systems |